Authentication device and system and method using same for on-line identity authentication and transaction

An authentication device and identity authentication technology, applied in user identity/authority verification, transmission system, payment system structure, etc., can solve the unavoidable hijacking of networked computer transactions, remote control of transaction tampering, and does not involve USBKey devices and authentication/transaction servers Interactive cooperation and other issues to achieve high security, avoid SMS delay, and strong convenience

Inactive Publication Date: 2010-09-29
WUHAN LUOJIA NEW CENTURY INFORMATION
View PDF1 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this invention can avoid the problems of USBKey device being hijacked by transaction, transaction tampering and remote control, it does not involve the authentication device, that is, the interaction and cooperation between the...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device and system and method using same for on-line identity authentication and transaction
  • Authentication device and system and method using same for on-line identity authentication and transaction
  • Authentication device and system and method using same for on-line identity authentication and transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Example 1: see image 3 , A method for online identity authentication using the above authentication device.

[0074] A method for online identity authentication using the above authentication device, the method sequentially includes the following steps:

[0075] In step 301, the user connects the authentication device 201 of the present invention to the networked computer 202 through the interface circuit 101;

[0076] In step 302, the user uses the networked computer 202 to enter login information, such as a user name;

[0077] In step 303, the above-mentioned networked computer 202 transmits the login information to the authentication server 203 via the network;

[0078] In step 304, after receiving the login request, the authentication server 203 randomly generates a 6-10 digit verification code, and then uses the user's public key to encrypt the verification code. The encryption method uses 1024-bit or above RSA encryption or 192 The elliptic curve encryption of bits and ab...

Embodiment 2

[0086] Example 2: see Figure 4 , A method for online transactions using the above authentication device.

[0087] A method for online transactions using the above authentication device, the method sequentially includes the following steps:

[0088] In step 501, the user connects the authentication device 201 of the present invention to the networked computer 202 through the interface circuit 101;

[0089] In step 502, the user uses the networked computer 202 to enter the requested transaction information, such as account name, account number, and transaction amount;

[0090] In step 503, the networked computer 202 transmits the requested transaction information to the transaction server 203 via the network;

[0091] In step 504, after receiving the login request, the transaction server 203 randomly generates a 6-10 digit verification code, and then uses the user's public key to encrypt the transaction information, such as the account name, account number, and transaction amount, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication device comprising an interface circuit, an indicator light, a visual screen and a safe chip, wherein the safe chip comprises a digital certificate, a private key, an encryption/ decryption module and a digital signature module. The system which uses the authentication device for on-line identity authentication and transaction comprises an authentication device, a networking computer and an authentication/ transaction computer. The method which uses the authentication device for on-line identity authentication and transaction has the key point that the authentication device decrypts encrypted information sent by an authentication/ transaction server and carries out digital signature, and the authentication/ transaction server verifies decryption information fed back by the authentication device. The invention improves the safety of on-line identity authentication and transaction by the visual screen, the encryption/ decryption module and the digital signature module which are arranged in the authentication device and by the interactive cooperation of users and the authentication/ transaction server, can effectively avoid the problems of Internet banking transaction hijacking, transaction falsification and remote control to embezzle user funds.

Description

Technical field [0001] The invention relates to an authentication device, in particular to an authentication device and a system and method for online identity authentication and transaction using it, and is particularly suitable for network identity authentication and online data transmission security. Background technique [0002] At present, the rapid development of the Internet and the great convenience it provides have caused people to rely more and more on the Internet for various activities, such as online banking, online shopping, online payment, etc. However, the Internet provides people with convenience at the same time. Its openness also brings great security risks to people, so network information security is also attracting more and more attention. The premise of network information security is to accurately identify legitimate users and achieve access control. [0003] User identity authentication is an important part of the network application security system. The ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06Q40/00G06Q20/00
Inventor 孙金龙胡进阳凌怡何德彪
Owner WUHAN LUOJIA NEW CENTURY INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products